Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
10 of the most important cyber security articles of 2017
With new laws, new threats and data breach cover-ups, 2017 was another big year for cyber security. Here are the stories everyone was talking about. 1. New Bill Forces Cybersecurity Responsibility Into the Boardroom In March, a new bill introduced to the US senate...
Managing the introduction of information security awareness programmes in organisations
Several studies explore information security awareness focusing on individual and/or organisational aspects. This paper argues that security awareness processes are associated with interrelated changes that occur at the organisational, the technological and the...
3 mistakes people make with cyber security training
A 2017 survey revealed 52% of organisations’ cyber security budgets are increasing, with 23% of the increases dedicated to training. At the same time, the UK’s 2017 cyber security breaches survey revealed the number of UK businesses that suffered a breach or attack in...
15 architects building the data-driven future
SiliconRepublic
How the ‘cocktail party effect’ leaves us vulnerable to cyber attack
How the ‘cocktail party effect’ leaves us vulnerable to attack – and what the cyber security industry might be able to do about it With Christmas fast approaching, many of us will soon be attending our annual Christmas parties. At such parties, it’s impractical for...
NHS will use white hat hackers to probe its own cyber defences
Computing
NHS to hire white hat hackers as part of £20m cybersecurity investment
The Inquirer
NHS remedies cybersecurity weakness with £20m hacker unit
Computer Business Review
Computing – Security Excellence Awards 2017 – and here are the winners
Computing
Winners!
Computing
To pay or not to pay: how the City can learn from the Uber cover-up
Financial News
Avoid A Costly Black Friday Data Breach – Top Tips For Keeping Your Business Secure
Huffington Post UK
How to keep your company secure this Black Friday
Black Friday and Cyber Monday are notoriously conducive to cyber scams. In this article, CybSafe founder Oz Alashe offers five tips on staying safe during the annual sales. ‘If something seems too good to be true, it probably is.’ That’s the mantra cyber security...
Employee information security beliefs in the home environment
Through a series of qualitative interviews with 19 participants, this study looked into and reported several factors influencing employees' security behaviour at home.
The socio-technical impact on security of the healthcare internet of things in the use of personal monitoring devices (PMDs)
This paper sets out a framework that might allow those who use healthcare personal monitoring devices (such as fitness trackers) to better protect their personal information.
What do they really think? Overcoming social acceptability bias in information security research
This study used two techniques to ensure people accurately reported attitudes on information security in the workplace. A key finding was those who believed information security to be the responsibility of the organisation felt security risks to be overstated, whereas...
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture
This study looked into how individual differences and national culture impacted participants’ responses to phishing and spear-phishing emails. The study found a national culture that promoted the needs of the individual (rather than the needs of society) increased the...
Understanding the relationships between resilience, work stress and information security awareness
This study examined the relationship between Information Security Awareness (ISA), resilience and work stress, finding greater resilience to be associated with higher ISA and lower work stress.
Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness
This study examined the relationship between perception of risk, organisational commitment, and Information Security Awareness (ISA), finding both organisational commitment and perception of personal risk to be significant predictors of ISA. Surprisingly, frequency of...
Deep thought: A cybersecurity story
ideas42 aims to help solve difficult social problems using insights from behavioural science. In this instance, the problem in question is the human aspect of cyber security. The paper applies psychology and behavioural science principles to common cyber security...
Embedding security behaviours: Using the 5Es
This framework is designed to help embed and sustain security behaviours in employees. The framework is condensed into 5Es (Educate, Enable, Environment, Encourage, Evaluate) and explains how to implement these using examples and tactical interventions.